test_group_session.cpp 8.56 KB
Newer Older
1
2
3
4
5
6
7
8
9
10
11
12
13
14
/* Copyright 2016 OpenMarket Ltd
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
15
#include "olm/inbound_group_session.h"
16
17
18
19
20
21
#include "olm/outbound_group_session.h"
#include "unittest.hh"


int main() {

22
{
23
    TestCase test_case("Pickle outbound group session");
24
25

    size_t size = olm_outbound_group_session_size();
26
    uint8_t memory[size];
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
    OlmOutboundGroupSession *session = olm_outbound_group_session(memory);

    size_t pickle_length = olm_pickle_outbound_group_session_length(session);
    uint8_t pickle1[pickle_length];
    olm_pickle_outbound_group_session(session,
                                      "secret_key", 10,
                                      pickle1, pickle_length);
    uint8_t pickle2[pickle_length];
    memcpy(pickle2, pickle1, pickle_length);

    uint8_t buffer2[size];
    OlmOutboundGroupSession *session2 = olm_outbound_group_session(buffer2);
    size_t res = olm_unpickle_outbound_group_session(session2,
                                                     "secret_key", 10,
                                                     pickle2, pickle_length);
    assert_not_equals((size_t)-1, res);
    assert_equals(pickle_length,
                  olm_pickle_outbound_group_session_length(session2));
    olm_pickle_outbound_group_session(session2,
                                      "secret_key", 10,
                                      pickle2, pickle_length);

    assert_equals(pickle1, pickle2, pickle_length);
}

52

53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
{
    TestCase test_case("Pickle inbound group session");

    size_t size = olm_inbound_group_session_size();
    uint8_t memory[size];
    OlmInboundGroupSession *session = olm_inbound_group_session(memory);

    size_t pickle_length = olm_pickle_inbound_group_session_length(session);
    uint8_t pickle1[pickle_length];
    olm_pickle_inbound_group_session(session,
                                     "secret_key", 10,
                                     pickle1, pickle_length);
    uint8_t pickle2[pickle_length];
    memcpy(pickle2, pickle1, pickle_length);

    uint8_t buffer2[size];
    OlmInboundGroupSession *session2 = olm_inbound_group_session(buffer2);
    size_t res = olm_unpickle_inbound_group_session(session2,
                                                    "secret_key", 10,
                                                    pickle2, pickle_length);
    assert_not_equals((size_t)-1, res);
    assert_equals(pickle_length,
                  olm_pickle_inbound_group_session_length(session2));
    olm_pickle_inbound_group_session(session2,
                                      "secret_key", 10,
                                      pickle2, pickle_length);

    assert_equals(pickle1, pickle2, pickle_length);
}

83
84
85
{
    TestCase test_case("Group message send/receive");

86
87
88
89
90
    uint8_t random_bytes[] =
        "0123456789ABDEF0123456789ABCDEF"
        "0123456789ABDEF0123456789ABCDEF"
        "0123456789ABDEF0123456789ABCDEF"
        "0123456789ABDEF0123456789ABCDEF"
Richard van der Hoff's avatar
Richard van der Hoff committed
91
        "0123456789ABDEF0123456789ABCDEF"
92
93
94
        "0123456789ABDEF0123456789ABCDEF";


95
    /* build the outbound session */
96
    size_t size = olm_outbound_group_session_size();
97
    uint8_t memory[size];
98
99
    OlmOutboundGroupSession *session = olm_outbound_group_session(memory);

100
    assert_equals((size_t)160,
101
102
103
104
105
106
                  olm_init_outbound_group_session_random_length(session));

    size_t res = olm_init_outbound_group_session(
        session, random_bytes, sizeof(random_bytes));
    assert_equals((size_t)0, res);

107
108
109
110
111
112
    assert_equals(0U, olm_outbound_group_session_message_index(session));
    size_t session_key_len = olm_outbound_group_session_key_length(session);
    uint8_t session_key[session_key_len];
    olm_outbound_group_session_key(session, session_key, session_key_len);

    /* encode the message */
113
114
115
116
117
118
    uint8_t plaintext[] = "Message";
    size_t plaintext_length = sizeof(plaintext) - 1;

    size_t msglen = olm_group_encrypt_message_length(
        session, plaintext_length);

119
    uint8_t msg[msglen];
120
121
122
    res = olm_group_encrypt(session, plaintext, plaintext_length,
                            msg, msglen);
    assert_equals(msglen, res);
123
124
125
126
127
128
129
130
131
132
    assert_equals(1U, olm_outbound_group_session_message_index(session));


    /* build the inbound session */
    size = olm_inbound_group_session_size();
    uint8_t inbound_session_memory[size];
    OlmInboundGroupSession *inbound_session =
        olm_inbound_group_session(inbound_session_memory);

    res = olm_init_inbound_group_session(
133
        inbound_session, session_key, session_key_len);
134
    assert_equals((size_t)0, res);
135

136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155

    /* Check the session ids */

    size_t out_session_id_len = olm_outbound_group_session_id_length(session);
    uint8_t out_session_id[out_session_id_len];
    assert_equals(out_session_id_len, olm_outbound_group_session_id(
        session, out_session_id, out_session_id_len
    ));

    size_t in_session_id_len = olm_inbound_group_session_id_length(
        inbound_session
    );
    uint8_t in_session_id[in_session_id_len];
    assert_equals(in_session_id_len, olm_inbound_group_session_id(
        inbound_session, in_session_id, in_session_id_len
    ));

    assert_equals(in_session_id_len, out_session_id_len);
    assert_equals(out_session_id, in_session_id, in_session_id_len);

156
157
158
159
160
161
162
163
    /* decode the message */

    /* olm_group_decrypt_max_plaintext_length destroys the input so we have to
       copy it. */
    uint8_t msgcopy[msglen];
    memcpy(msgcopy, msg, msglen);
    size = olm_group_decrypt_max_plaintext_length(inbound_session, msgcopy, msglen);
    uint8_t plaintext_buf[size];
164
    uint32_t message_index;
165
    res = olm_group_decrypt(inbound_session, msg, msglen,
166
                            plaintext_buf, size, &message_index);
167
168
    assert_equals(plaintext_length, res);
    assert_equals(plaintext, plaintext_buf, res);
169
    assert_equals(message_index, uint32_t(0));
170
171
}

Richard van der Hoff's avatar
Richard van der Hoff committed
172
173
174
175
176
177
178
{
    TestCase test_case("Invalid signature group message");

    uint8_t plaintext[] = "Message";
    size_t plaintext_length = sizeof(plaintext) - 1;

    uint8_t session_key[] =
179
180
181
182
183
        "AgAAAAAwMTIzNDU2Nzg5QUJERUYwMTIzNDU2Nzg5QUJDREVGMDEyMzQ1Njc4OUFCREVGM"
        "DEyMzQ1Njc4OUFCQ0RFRjAxMjM0NTY3ODlBQkRFRjAxMjM0NTY3ODlBQkNERUYwMTIzND"
        "U2Nzg5QUJERUYwMTIzNDU2Nzg5QUJDREVGMDEyMztqJ7zOtqQtYqOo0CpvDXNlMhV3HeJ"
        "DpjrASKGLWdop4lx1cSN3Xv1TgfLPW8rhGiW+hHiMxd36nRuxscNv9k4oJA/KP+o0mi1w"
        "v44StrEJ1wwx9WZHBUIWkQbaBSuBDw";
Richard van der Hoff's avatar
Richard van der Hoff committed
184
185

    uint8_t message[] =
186
187
        "AwgAEhAcbh6UpbByoyZxufQ+h2B+8XHMjhR69G8nP4pNZGl/3QMgrzCZPmP+F2aPLyKPz"
        "xRPBMUkeXRJ6Iqm5NeOdx2eERgTW7P20CM+lL3Xpk+ZUOOPvsSQNaAL";
Richard van der Hoff's avatar
Richard van der Hoff committed
188
189
190
191
192
193
194
195
196
    size_t msglen = sizeof(message)-1;

    /* build the inbound session */
    size_t size = olm_inbound_group_session_size();
    uint8_t inbound_session_memory[size];
    OlmInboundGroupSession *inbound_session =
        olm_inbound_group_session(inbound_session_memory);

    size_t res = olm_init_inbound_group_session(
197
        inbound_session, session_key, sizeof(session_key)-1
Richard van der Hoff's avatar
Richard van der Hoff committed
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
    );
    assert_equals((size_t)0, res);

    /* decode the message */

    /* olm_group_decrypt_max_plaintext_length destroys the input so we have to
       copy it. */
    uint8_t msgcopy[msglen];
    memcpy(msgcopy, message, msglen);
    size = olm_group_decrypt_max_plaintext_length(
        inbound_session, msgcopy, msglen
    );

    memcpy(msgcopy, message, msglen);
    uint8_t plaintext_buf[size];
213
    uint32_t message_index;
Richard van der Hoff's avatar
Richard van der Hoff committed
214
    res = olm_group_decrypt(
215
        inbound_session, msgcopy, msglen, plaintext_buf, size, &message_index
Richard van der Hoff's avatar
Richard van der Hoff committed
216
    );
217
    assert_equals(message_index, uint32_t(0));
Richard van der Hoff's avatar
Richard van der Hoff committed
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
    assert_equals(plaintext_length, res);
    assert_equals(plaintext, plaintext_buf, res);

    /* now twiddle the signature */
    message[msglen-1] = 'E';
    memcpy(msgcopy, message, msglen);
    assert_equals(
        size,
        olm_group_decrypt_max_plaintext_length(
            inbound_session, msgcopy, msglen
        )
    );

    memcpy(msgcopy, message, msglen);
    res = olm_group_decrypt(
        inbound_session, msgcopy, msglen,
234
        plaintext_buf, size, &message_index
Richard van der Hoff's avatar
Richard van der Hoff committed
235
236
237
238
239
240
241
242
243
    );
    assert_equals((size_t)-1, res);
    assert_equals(
        std::string("BAD_SIGNATURE"),
        std::string(olm_inbound_group_session_last_error(inbound_session))
    );
}


244
}